48
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Path-history-based access control for mobile agents

&
Pages 215-225 | Received 06 Dec 2004, Accepted 01 Jul 2005, Published online: 03 Apr 2009

References

  • Gray , R.S. , Kotz , D. , Cybenko , G. and Rus , D. 2000 . Mobile agents: Motivations and state-of-the-art systems . Dartmouth , : TR2000 – TR2365 .
  • Samarati , P. and Vimercati , S.D. 2001 . “ Access control: Policies, models, and mechanisms ” . In Revised Versions of Lectures Given During the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures , Lecture Notes In Computer Science Vol. 2171 , 137 – 196 . London : Springer-Verlag .
  • Yang , K. , Guo , X. and Liu , D. 2000 . “ Security in mobile agent system: Problems and approaches ” . In SIGOPS Operating System Review , Vol. 34 , 21 – 22 . New York, NY : ACM Press . No. 1
  • Li , X. , Lu , J. , Cao , C. , Feng , X. and Tao , X. 2000 . Research on security in mobile agent system . Journal of Software , 13 ( 10 ) : 1991 – 1999 .
  • Jansen , W. 2001 . “ Determining privileges of mobile agents ” . In Proceedings of the 17th Annual Computer Security Applications Conference, ACSAC , 149 Washington, DC : IEEE Computer Society .
  • Jansen , W. 2000 . Countermeasures for mobile agent security . Computer Communications , 23 ( 10 ) : 1667 – 1677 .
  • Tripathi , A. and Karnik , N. 1998 . “ Protected resource access for mobile agent-based distributed computing ” . In Proceedings of the 1998 International Conference on Parallel Processing Workshops, ICPPW , 144 Washington, DC : IEEE Computer Society .
  • Maggi , P. and Sisto , R. 2003 . “ A configurable mobile agent data protection protocol ” . In Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems 851 – 858 .
  • Xu , C. and Fu , S. 2003 . “ Privilege delegation and agent-oriented access control in Naplet ” . In Proceedings of the 23rd International Conference on Distributed Computing Systems, ICDCSW , 493 – 497 . Washington, DC : IEEE Computer Society .
  • Xu , C. 2005 . “ Naplet: A mobile agent approach ” . In Scalable and Secure Internet Services and Architecture , 219 – 246 . Boca Raton, FL : CRC Press .
  • Sonntag , M. and Hörmanseder , R. 2000 . “ Mobile agent security based on payment ” . In SIGOPS Operating System Review , Vol. 34 , 48 – 55 . New York, NY : ACM Press . No. 4
  • Cao , C. , Zheng , W. , Lü , J. and Tao , X. 2003 . Defense against DoS attack in Mogent system . Mini-Micro Systems , 24 ( 12 ) : 2070 – 2207 .
  • Zhang , G. and Parashar , M. 2004 . “ Context-aware dynamic access control for pervasive applications ” . In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference
  • Covington , M.J. 2001 . “ Securing context-aware applications using environment roles ” . In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
  • Roth , V. 1998 . “ Secure recording of itineraries through co-operating agents ” . In Workshop Ion on Object-Oriented Technology , Lecture Notes In Computer Science vol. 1543 , 297 – 298 . London : Springer-Verlag .
  • Ferraiolo , D. , Sandhu , R. and Gavrila , S. 2001 . Proposed NIST standard for role-based access control . ACM Transactions on Information and System Security , 4 ( 3 ) : 224 – 274 .
  • Ordille , J. 1996 . “ When agents roam, who can you trust? ” . In Proceedings of Emerging Technologies and Applications in Communications Portland
  • Dimmock , N. and Belokosztolszki , A. 2004 . “ Using trust and risk in role-based access control policies ” . In Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies 156 – 162 .
  • Bertino , E. , Bonatti , P. and Ferrari , E. 2001 . TRBAC: A temporal role-based access control model . ACM Transactions on Information and System Security , 4 ( 3 ) : 191 – 233 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.